-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Format: 1.8 Date: Sat, 18 Jun 2011 13:30:40 -0600 Source: user-mode-linux Binary: user-mode-linux Architecture: i386 Version: 2.6.26-1um-2+26lenny3 Distribution: lenny Urgency: high Maintainer: i386 Build Daemon (murphy) Changed-By: dann frazier Description: user-mode-linux - User-mode Linux (kernel) Changes: user-mode-linux (2.6.26-1um-2+26lenny3) oldstable-security; urgency=high . * Rebuild against linux-source-2.6.26 (2.6.26-26lenny3): * net: clear heap allocations for privileged ethtool actions (CVE-2010-4655) * xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1 (CVE-2011-0711) * [s390] remove task_show_regs (CVE-2011-0710) * fs/partitions: Validate map_count in Mac partition tables (CVE-2011-1010) * ldm: corrupted partition table can cause kernel oops (CVE-2011-1012) * Bluetooth: sco: fix information leak to userspace (CVE-2011-1078) * Bluetooth: bnep: fix buffer overflow (CVE-2011-1079) * bridge: netfilter: fix information leak (CVE-2011-1080) * nfs4: Ensure that ACL pages sent over NFS were not allocated from the slab (CVE-2011-1090) * dccp: fix oops on Reset after close (CVE-2011-1093) * Fix corrupted OSF partition table parsing (CVE-2011-1163) * netfilter: arp_tables: fix infoleak to userspace (CVE-2011-1170) * netfilter: ip_tables: fix infoleak to userspace (CVE-2011-1171) * ipv6: netfilter: ip6_tables: fix infoleak to userspace (CVE-2011-1172) * econet: 4 byte infoleak to the network (CVE-2011-1173) * irda: validate peer name and attribute lengths (CVE-2011-1180) * RDMA/cma: Fix crash in request handlers (CVE-2011-0695) * IB/cm: Bump reference count on cm_id before invoking callback (CVE-2011-0695) * Prevent rt_sigqueueinfo and rt_tgsigqueueinfo from spoofing the signal code (CVE-2011-1182) * Relax si_code check in rt_sigqueueinfo and rt_tgsigqueueinfo (CVE-2011-1182) * proc: protect mm start_code/end_code in /proc/pid/stat (CVE-2011-0726) * cifs: Fix cache stuffing issue in the dns_resolver keyring (CVE-2010-2524) * serial: Fix information leak in TIOCGICOUNT ioctl (CVE-2010-4075) * net: ax25: improve information leak to userland fix, a further fix for CVE-2010-3875 * char/tpm: Fix unitialized usage of data buffer (CVE-2011-1160) * ROSE: prevent heap corruption with bad facilities (CVE-2011-1493) * next_pidmap: fix overflow condition (CVE-2011-1593) * can: Add missing socket check in can/bcm release (CVE-2011-1598) * agp: fix arbitrary kernel memory writes (CVE-2011-1745, CVE-2011-2022) * agp: fix OOM and buffer overflow (CVE-2011-1746) * can: Add missing socket check in can/raw release (CVE-2011-1748) * [arm] 6891/1: prevent heap corruption in OABI semtimedop (CVE-2011-1759) * gre: fix netns vs proto registration ordering (CVE-2011-1767) * Validate size of EFI GUID partition entries (CVE-2011-1776) * fs/partitions/ldm.c: fix oops caused by corrupted partition table (CVE-2011-1017) * Improve fix for buffer overflow in ldm_frag_add (CVE-2011-2182) * efi: corrupted GUID partition tables can cause kernel oops (CVE-2011-1577) * tunnels: fix netns vs proto registration ordering Checksums-Sha1: 1ce6e87fb691eab7d383483401f8cbcc8b44bcef 5392626 user-mode-linux_2.6.26-1um-2+26lenny3_i386.deb Checksums-Sha256: cef274e4f1b1a572cbe01fe2615664118b5967a1f07fc223513306bb9e2edc1a 5392626 user-mode-linux_2.6.26-1um-2+26lenny3_i386.deb Files: 53acdc97cd35549b956f1e2face157a7 5392626 misc extra user-mode-linux_2.6.26-1um-2+26lenny3_i386.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iQIcBAEBCAAGBQJOVWvPAAoJELdq5EKse8nBxt8P/RRkRSTfrA4p+PhXlfo3bZQ7 KPE/9MVTSKUycPDiuwBxzKN6FneLCAs3nvLsnT6YgUrMECuyJLpU9nRf7ed9G4dg hyuvUaYCJ7EhWLWkGdqao3Jph1tJMiR0JcfkCTVp5KCRXWO1OHGefnVZQwAxMJ86 1roHGp59Y6RjXH3eFsKlTmbTl6IOFZH8qV8DT0HtMHu+UzoObTCIGe6vADKf9D3w gMC2aEP/UlZEZ2MZ8HwU6iAmWHV1NlWYx3g5l8VNorBP+jL3wQwcN1LPg6tZCwlK hEV8mzWmNznsoSH2xRXTGTtCSzXmZuhrK5ksOmMHw1LiUjWDxbJc28FGOPN7/diX D0FINjNunyqiClGMm2OM8/4/Pp2tmXjuR/Ht9NwGjxma2LTvxHlj1Cxt/sHY23Kt dIaUh5g/LZ3N5DKKZaf+JnmoKhJdGksppf63QOXdcZEoaF01mharrsV2fhr+LBcF ZH3xkZHqN/u8V/H9OJQhgovXb5KgFAVI3GloD8kaqakT9P+7PLWYTKKsD2LX+mmp q5xY8aKUfsqna6yBBvW1bDu4FA/9m4GrPDd5kGWafpX4i+vLh2WrErThiJRnc/Xb ZDqUxGLCUovRO4za+W00yFTzDpOYuu6kTaXPLSDWTEDrMw5TGmjLF3xrdoWl0Gpn Va04eytTDvClv2iOEe2e =ijNW -----END PGP SIGNATURE-----